Library
My library

Add to library

Profile

Virus library

An analysis of the technologies used by cybercriminals allows us to draw conclusions about the virus industry’s possible vectors of development and more effectively confront future threats. You, too, can learn what actions various malicious programs take in infected systems and how to withstand them.

Recent malware descriptions

Danger Virus name Date Detection date Details
G2.468 16.02.2006 --- Show
NMSG.214 16.02.2006 --- Show
ExeHeader.Nla 16.02.2006 --- Show
Psycho.723 16.02.2006 --- Show
Nitrate.871 16.02.2006 --- Show
G2.Nirvana.835 16.02.2006 --- Show
Nipple.208 16.02.2006 --- Show
Override.1380 16.02.2006 --- Show
Ninja.1525 16.02.2006 --- Show
Ninja.1376 16.02.2006 --- Show
Ninja.1336 16.02.2006 --- Show
Ninja.1225 16.02.2006 --- Show
Ninja.1383 16.02.2006 --- Show
Ninja.1370 16.02.2006 --- Show
Ninja.1264 16.02.2006 --- Show
NinetyTwo.1148 16.02.2006 --- Show
Nines.776 16.02.2006 --- Show
Nines.706 16.02.2006 --- Show
Nines.705 16.02.2006 --- Show
Nina.256 16.02.2006 --- Show
MGTU.273 16.02.2006 --- Show
Nilz.1000 16.02.2006 --- Show
Nikolas.1101 16.02.2006 --- Show
Nik.442 16.02.2006 --- Show
Nihil.1469 16.02.2006 --- Show
Night.938 16.02.2006 --- Show
Night.2048 16.02.2006 --- Show
NightKnight.1940 16.02.2006 --- Show
NightKing.1568 16.02.2006 --- Show
Crawler.545 16.02.2006 --- Show
Danish.284 16.02.2006 --- Show
NightCity 16.02.2006 --- Show
Trojan.Night 16.02.2006 --- Show
Nigeb.890 16.02.2006 --- Show
Nado.807 16.02.2006 --- Show
Nichols.dropper 16.02.2006 --- Show
NTMY.1722 16.02.2006 --- Show
Sahand.896 16.02.2006 --- Show
SillyO.276 16.02.2006 --- Show
NG.914 16.02.2006 --- Show
NG.706 16.02.2006 --- Show
NG.695 16.02.2006 --- Show
NG.1036 16.02.2006 --- Show
NextGen.2304 16.02.2006 --- Show
KOV.Next.1798 16.02.2006 --- Show
KOV.Next.1785 16.02.2006 --- Show
KOV.Next.1722 16.02.2006 --- Show
KOV.Next.1592 16.02.2006 --- Show
Trojan.FormatA.144 16.02.2006 --- Show
Newyear.1356 16.02.2006 --- Show

Vulnerabilities for Android

According to statistics, every fifth program for Android contains a vulnerability (or, in other words, a "loophole") that lets cybercriminals successfully introduce Trojans onto mobile devices and manipulate them into doing whatever actions they need them to.

Dr.Web Security Auditor for Android diagnoses and analyses a mobile device’s security and offers solutions to address security problems and vulnerabilities.